2013年12月16日星期一

Uplinking a Cisco 3560 Switch

I am fairly new to switching so I am just doing this in a test environment to teach myself some things. I am trying to uplink a cisco 3560 switch from another WS-C3560X-24T-L  switch. I have it linked and I can plug in a laptop to the switch and get out to the internet but I am unable to ping the switch, telnet, or ping from the switch. It shows that VLAN2 is down but I am not sure why. I have VLAN1 administratively down and should be using VLAN2.
The uplink port is configured like this:

 switchport trunk encapsulation dot1q
 switchport mode trunk
 srr-queue bandwidth share 10 10 60 20
 srr-queue bandwidth shape 10 0 0 0
 queue-set 2
 mls qos trust cos
 auto qos voip trust

The port that it is being uplinked from is configured like this:
 switchport trunk encapsulation dot1q
 switchport mode trunk
 I meant to say spare3.

Only do "sh vtp password" on the main WS-C3560X-24T-S   switch to see if there's any password setup.

2013年12月12日星期四

avaya ip office with Catalyst 3560

I have the following config for my switch

int gig0/1  through int gig0/20
WS-C3560X-48PF-S   switchport access vlan 10
  switchport voice vlan 20
The Avaya IP Office (PBX)  is doing the dhcp for the voip. vlan 10 has 10.10.40.0/24 subnet. vlan 20 has 10.10.45.0/24 subnet. My PCs are connected via the VoIP. The issue that I am having is I cannot ping the pbx from any of the PC. I can see its MAC address in the CAM table, Ip routing is enabled.

Each of the VLANs need to have an IP address configured (from the correct rage).

Also, the PCs needs to be set to have their default gateway pointing to the IP address of the switch.

Also, the PBX needs to have its default gateway pointing to the Cisco (or at least a static route for 10.10.40/24 with next hop being the cisco WS-C3560X-48PF-L).

You can check your set up on the switch with the "show ip route" command, to make sure it does have the relevant routes - once you have IP addresses in each VLAN.

Can you post a sanitized config from the switch?  Can the switch ping the VLAN default gateways and the PBX?

2013年11月26日星期二

cisco catalyst and cisco sbs with vlan

I have a cisco WS-C3560V2-24TS-S catalyst that i use as my gateway device. I also have a cisco sbs in the mix as well. Right now everything is working just fine. One cool thing i can do on the catalyst is create a single port interface assign to vlan 15. When i try the same thing on the cisco sbs using the gui it does not work at all. The SBS is allowing trunk access as i am able to hit all 3 of my VLANS.
I want to connect to the sbs on port 10 and assign my local network address to be 192.168.15.x  Any idea how i can do that.
( sg 200)

interface ethernet g10
switchport mode general
exit
vlan database
vlan 15,50
exit
interface ethernet g10
switchport general allowed vlan add 15 untagged
exit
interface vlan 15
name Servers
exit
interface vlan 50
name Shoretel
exit
voice vlan oui-table add 0001e3 Siemens_AG_phone________
voice vlan oui-table add 00036b Cisco_phone_____________
voice vlan oui-table add 00096e Avaya___________________
voice vlan oui-table add 000fe2 H3C_Aolynk______________
voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone
voice vlan oui-table add 00d01e Pingtel_phone___________
voice vlan oui-table add 00e075 Polycom/Veritel_phone___
voice vlan oui-table add 00e0bb 3Com_phone______________
interface vlan 1
ip address 192.168.1.39 255.255.255.0
exit
ip default-gateway 192.168.1.47
interface vlan 1
no ip address dhcp
exit
bonjour service enable csco-sb
bonjour service enable http  
hostname switch0fadac
no passwords complexity enable
username cisco password f7cdfec1454cbfcc61a97c9f6ce47515ed550d00 level 15 encrypted
clock timezone -8
clock summer-time recurring usa
snmp-server set rlAutomaticClockSetFromPCEnabled  rlAutomaticClockSetFromPCEnabled true

CATALYST 3560
S
!
hostname Server_3560G
no aaa new-model
udld aggressive

ip subnet-zero
ip routing
ip dhcp excluded-address 192.168.1.150 192.168.1.157
ip dhcp excluded-address 192.168.1.250 192.168.1.254
ip dhcp excluded-address 192.168.1.133
ip dhcp excluded-address 192.168.1.144
ip dhcp excluded-address 192.168.1.164
ip dhcp excluded-address 192.168.1.168
ip dhcp excluded-address 192.168.1.229
ip dhcp excluded-address 192.168.1.226
ip dhcp excluded-address 192.168.1.224
ip dhcp excluded-address 192.168.1.227
ip dhcp excluded-address 192.168.1.228
ip dhcp excluded-address 192.168.1.1 192.168.1.123
!
ip dhcp pool User_VLAN1
   network 192.168.1.0 255.255.255.0
   default-router 192.168.1.47
   dns-server 192.168.1.22 10.10.99.24
   lease 8
mls qos map cos-dscp 0 8 16 26 32 46 46 56
mls qos
macro global description cisco-global | cisco-global
errdisable recovery cause link-flap
errdisable recovery interval 60
no file verify auto
!
spanning-tree mode rapid-pvst
spanning-tree loopguard default
spanning-tree extend system-id
no spanning-tree vlan 49-50
!
vlan internal allocation policy ascending
!
interface GigabitEthernet0/1
 switchport access vlan 15
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode access
 spanning-tree portfast
!
interface GigabitEthernet0/2
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/3
 switchport access vlan 15
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode access
!
interface GigabitEthernet0/4
!
interface GigabitEthernet0/5
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15,50
 switchport mode trunk
!
interface GigabitEthernet0/6
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/7
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/8
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/9
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15,50
 switchport mode trunk
!
interface GigabitEthernet0/10
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/11
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/12
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/13
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/14
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/15
 switchport access vlan 15
 switchport mode access
 spanning-tree portfast
!
interface GigabitEthernet0/16
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/17
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/18
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,50
 switchport trunk pruning vlan none
 switchport mode trunk
!
interface GigabitEthernet0/19
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15,50
 switchport mode trunk
!
interface GigabitEthernet0/20
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15,50
 switchport mode trunk
!
interface GigabitEthernet0/21
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/22
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/23
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/24
 switchport trunk encapsulation dot1q
 switchport trunk allowed vlan 1,15
 switchport mode trunk
!
interface GigabitEthernet0/25
 switchport trunk pruning vlan none
!
interface GigabitEthernet0/26
!
interface GigabitEthernet0/27
!
interface GigabitEthernet0/28
!
interface Vlan1
 ip address 192.168.1.47 255.255.255.0
!
interface Vlan15
 ip address 192.168.15.1 255.255.255.0
!
interface Vlan49
 ip address 192.168.238.240 255.255.255.0
!
interface Vlan50
 ip address 192.168.16.240 255.255.255.0
 no ip redirects
!
ip classless

ip route 0.0.0.0 0.0.0.0 192.168.1.1
ip route 0.0.0.0 255.255.255.255 10.16.14.2
ip route 192.168.253.0 255.255.255.0 192.168.16.243
ip http server
!You can only have one active vlan interface on a layer 2 cisco WS-C3560V2-48TS-S switch. If you want to use an interface vlan 15 on the SG switch you will have to shut down the interface vlan 1 after creating the interface vlan 15. Then you should be able to connect to the sg 200 on that new interface.

2013年11月25日星期一

Configure Cisco 3560 with 2008R2 NAP for guest and internal VLANs

Hosts and users should be authenticated by a Radius Server. According to the user or machine group, when someone connects, the port on the Switch should be changed to an internal authorized VLAN. Users / PCs not in an AD security group should be placed in an "internet only" guest VLAN. .

Radius Server: MS Server 2008 R2
Client: MS Windows 7
Switch: Cisco Catalyst WS-C3560V2-24TS-S
Routing is done from the Core switch
DHCP is on a 2008R2 Server

I have ports on the switch configured as:

interface FastEthernet0/11
 description ports for radius
 switchport mode access
 switchport voice vlan 800
 switchport priority extend trust
 switchport port-security maximum 2
 switchport port-security
 switchport port-security aging time 2
 switchport port-security violation restrict
 switchport port-security aging type inactivity
 srr-queue bandwidth share 10 10 60 20
 srr-queue bandwidth shape  10  0  0  0
 mls qos trust device cisco-phone
 mls qos trust cos
 auto qos voip cisco-phone
 dot1x pae authenticator
 dot1x port-control auto
 dot1x host-mode multi-domain
 dot1x timeout reauth-period 60
 dot1x reauthentication
 dot1x guest-vlan 50
 dot1x auth-fail vlan 30
 dot1x auth-fail max-attempts 2
 spanning-tree portfast
 spanning-tree bpduguard enable
end

Your NPS Server needs to have a certificate trusted by the workstations. This can mean a certificate you buy, or one from an internal certificate authority that has been installed as a trusted CA by your workstations.

Checklist: Configure NPS for 802.1X Authenticating Switch Access
http://technet.microsoft.com/en-us/library/cc732256(v=ws.10).aspx

focusing on the NPS policy

Use the 802.1X Wizard to Configure NPS Network Policies
http://technet.microsoft.com/en-us/library/dd283091(v=ws.10).aspx

Don't forget the RADIUS portion of your switch config

aaa new-model
!
!
aaa group server radius rad_eap
 server name YOURNPSSERVERNAME1
 server name YOURNPSSERVERNAME2
!
aaa authentication dot1x default group rad_eap
aaa authorization network default group rad_eap local
!
radius-server attribute 32 include-in-access-req format %h
radius-server retransmit 2
radius-server timeout 3
radius-server deadtime 1
radius-server key your-shared-key-for NPS-servers
radius-server vsa send authentication
!
radius server YOURNPSSERVERNAME1
 address ipv4 10.0.0.10 auth-port 1645 acct-port 1646
!
radius server YOURNPSSERVERNAME2
 address ipv4 10.0.0.11 auth-port 1645 acct-port 1646

Excellent

2013年11月22日星期五

CISCO 3560 SWITCH - VLANS - SECURING VLANS

I have a WS-C3560X-24P-S 24 port switch that I have VLANS created on -

this switch will be put into a multi-tenant building / each port equates to a separate office.

I have all of the interface stuff ready to go but would like to secure each VLAN from each other.

I am guessing that I need some sort of access-list to accomplish that - Is there any other way?

It allows you to restrict traffic between ports (VLANs) without requiring you to create a separate IP addressing scheme for each VLAN.

Basically, there are 3 types of ports in a private VLAN environment.

Isolated - Can only communicate with promiscuous ports
Community - Can only communicate with ports in the same community and promiscuous ports (you can have multiple communities).

Promiscuous -WS-C3560X-24P-L Can communicate with all ports.

2013年11月20日星期三

Where to buy Cisco WS-C3560V2-24TS-S?

The Cisco list price for WS-C3560V2-24TS-S is 2,995.00 USD, there are many suppliers for this, according to our research on WS-C3560V2-24TS-S Price, best price is from, http://www.3anetwork.com/cisco-ws-c3560v2-24ts-s-price_p48.html, 879.00 USD, but they are based in Hong Kong, so may take 3 days to reach your country, some other sources for your reference:
1, distributors, like Ingram Micro, Comstor, Tech Data, Redington etc, different countries different distributors, also different price related to your region, partner level and project level, normally around 30%~60% off GPL;

2, http://www.amazon.com/Cisco-Catalyst-Series-Standard-WS-C3560V2-24TS-S/dp/B002CBHMEC/ref=sr_1_1?ie=UTF8&qid=1385003702&sr=8-1&keywords=WS-C3560V2-24TS-S , 729.00 USD, good price but frankly speaking Amazon is not professional in Cisco products at all, as can see from their description, also the list price 2995 USD is not correct, if you are located in US, maybe you can try, otherwise better find a professional networking supplier,
3, http://us.hardware.com/products/cisco/WS-C3560V2-24TS-S, 2,036.59 USD, more professional but price too too expensive;
4, http://www.ebay.com/itm/NEW-CISCO-WS-C3560V2-24TS-S-24-Port-Catalyst-MANAGED-GIGABIT-SWITCH-OPEN-BOX-/251382792120?pt=US_Network_Switches&hash=item3a8794ffb8, there are many cheap option, if want a used one, ebay would be a good source;


WS-C3560V2-24TS-S, Catalyst 3560V2 24 10/100 + 2 SFP + IPB (Standard) Image

2013年11月14日星期四

Configuration file of Huawei Router AR3200

sysname Router Huawei AR3260
#                                                                              
vlan batch 10 20
#
interface Eth-Trunk1
 port link-type trunk
 port trunk allow-pass vlan 10 20
 load-balance src-dst-mac
#
interface Ethernet1/0/1
 eth-trunk 1
#
interface Ethernet1/0/2
 eth-trunk 1
#
interface Ethernet1/0/3
 eth-trunk 1
#
interface Ethernet1/0/4
 port link-type trunk
 port trunk allow-pass vlan 10
#
interface Ethernet1/0/5
 port link-type trunk
 port trunk allow-pass vlan 20
#
return

#
sysname RouterB
#                                                                              
vlan batch 10 20
#
interface Eth-Trunk1
 port link-type trunk
 port trunk allow-pass vlan 10 20
 load-balance src-dst-mac
#
interface Ethernet1/0/1
 eth-trunk 1
#
interface Ethernet1/0/2
 eth-trunk 1
#
interface Ethernet1/0/3
 eth-trunk 1
#
interface Ethernet1/0/4
 port link-type trunk
 port trunk allow-pass vlan 20
#
interface Ethernet1/0/5
 port link-type trunk
 port trunk allow-pass vlan 10
#
return


For more Huawei ME60-X3 information please click here

24- and 48-Port Cisco 3560 Switches

Attaching Brackets to the Catalyst WS-C3560V2-48PS-S Switch
The bracket orientation and the brackets that you use depend on whether you are attaching the brackets
for a 19-inch or a 24-inch rack.
 • For 19-inch racks, use bracket part number 700-8209-01
 • For 24-inch racks, use bracket part number 700-13248-01.
After the switch is mounted in the rack:
1. Connect to a 10/100 or 10/100/1000 port, and run Express Setup. STo use the CLI setup program,“Configuring the Switch with the CLI-Based Setup Program.”
2. Connect to the front-panel ports.
 • Catalyst 3560-24PS, 3560-24TS-S, 3560-48PS, and 3560-48TS-S
 • Catalyst 3560G-24PS, 3560G-24TS, 3560G-48PS, and 3560G-48TS
These switches wall-mount with the front panel facing up or down:
 • Catalyst 3560V2-24PS, 3560V2-24TS, 3560V2-48PS, and 3560V2-48TS
After the switch is mounted in the rack:
1. Power on the switch. 
2. Connect to a 10/100 or 10/100/1000 port, and run Express Setup.  To use the CLI setup program,
3. Connect to the front-panel ports.
Table- or Shelf- Mounting
Step 1 Locate the adhesive strip with the rubber feet in the mounting-kit envelope. Attach the four rubber feet
to the bottom of the switch near the corners.
Note Do not attach the rubber feet over the recessed screw holes on the bottom of the switch.
Step 2 Place the switch on the table or shelf near an AC power source.
After the switch is mounted in the rack:
1. Power on the switch. See the “Verifying Switch Operation” section on page 2-6.
2. Connect to a 10/100 or 10/100/1000 port, and run Express Setup.
Getting Started Guide for instructions.
3. Connect to the front-panel ports.


For more Cisco information please click here
http://www.3anetwork.com/cisco-ws-c3560x-48pf-l-price_p60.html

2013年11月7日星期四

WS-C3750V2-48TS-S,Catalyst 3750V2 48 10/100 + 4 SFP Standard Image

The Cisco Catalyst WS-C3750V2-48TS-S Series Switches are next-generation energy-efficient Layer 3 Fast Ethernet stackable switches. This new series of switches supports Cisco EnergyWise technology, which enables companies to measure and manage power consumption of network infrastructure and network-attached devices, thereby reducing their energy costs and their carbon footprints. The Cisco Catalyst 3750 v2 Series consumes less power than its predecessors and is the ideal access layer for enterprise, retail, and branch-office environments, as it increases productivity and investment protection by enabling a unified network for data, voice, and video.

 Manufacturer/Supplier: Cisco Systems, Inc
* Manufacturer Part Number: WS-C3750V2-48TS-S
* Manufacturer Website Address: www.cisco.com
* Brand Name: Cisco
* Product Line: Catalyst
* Product Series: 3750
* Product Model: 3750V2-48TS
* Product Name: Catalyst 3750V2-48TS Stackable Ethernet Switch
* Marketing Information: The Cisco Catalyst 3750V2-48TS Switch is next-generation energy-efficient Layer 3 Fast Ethernet stackable switch. This new switch supports Cisco EnergyWise technology, which enables companies to measure and manage power consumption of network infrastructure and network-attached devices, thereby reducing their energy costs and their carbon footprints. The Cisco Catalyst 3750V2-48TS consumes less power than its predecessors and is the ideal access layer for enterprise, retail, and branch-office environments, as it increases productivity and investment protection by enabling a unified network for data, voice, and video.
* Product Type: Layer 3 Switch
* Number of Ports: 48
* Fast Ethernet Port: Yes

The Cisco Catalyst 3750 v2 series is the next generation energy-efficient Layer 3 fast Ethernet, stackable switches. This series of switches support Cisco EnergyWise technology, which enables companies to measure and manage power consumption of network infrastructure and network-attached devices, thereby reducing their energy costs and their carbon footprint.



For more Cisco WS-C3750V2-48PS-S information please click here

2013年11月4日星期一

Cisco compatible SFP-10G-SR

SFP-10G-SR,Transceiver in 6120XP for ethernet uplink,Cisco SFP+ optical modules that are supported in the 500X switches are: SFP-10G-SR, SFP-10G-LRM, and SFP-10G-LR.

For instance, the SFP+ is available for the Cisco Nexus 7000 Series and Cisco Nexus 5000 Series. The new transceiver is expected to propagate across the Cisco Catalyst 6000 Series Switches, including incorporation in new line cards for the Cisco Catalyst 6500, as well as to the next-generation Cisco Catalyst 4500 Series and Cisco Catalyst 3000 Series Switches. The Catalyst 3560-X switch supports the SFP+ module patch cable, a 0.5-meter, copper, passive cable with SFP+ module connectors at each end. The patch cable connects two Catalyst 3560-X switches in a cascaded configuration. The Cisco SFP-10G-SR module supports a link length of 26m on standard Fiber Distributed Data Interface (FDDI)-grade multimode fiber (MMF). Using 2000MHz*km MMF (OM3), up to 300m link lengths are possible. Using 4700MHz*km MMF (OM4), up to 400m link lengths are possible.

3Anetwork.com keeps regular stock of Cisco SFP-10G-SR, Cisco 10GBASE-SR Module SFP-10G-SR supports a link length of 26m on standard Fiber Distributed Data Interface (FDDI)-grade multimode fiber (MMF). Using 2000MHz*km MMF (OM3), up to 300m link lengths are possible. Using 4700MHz*km MMF (OM4), up to 400m link lengths are possible.



For more Cisco GLC-LH-SMD information please click here

2013年11月3日星期日

Cisco HWIC-2FE Cabling

The Cisco Fast Ethernet HWICs are singlewide interface cards, available as a 1-port HWIC (HWIC-1FE) and as a 2-port HWIC (HWIC-2FE), that provide Cisco modular and integrated services routers with additional Layer 3 routed ports.

The Cisco High-Speed WAN Interface Card (EHWIC) is an updated and enhanced version of the current HWIC for the Cisco Integrated Services Router Generation 2 (ISR G2). The EHWIC offers greater speeds (up to 800 Mbps bidirectionally) and higher port density than the current WIC. It also has a third row of pins for increased power to the cards, as well as support for Enhanced Power over Ethernet (EPoE) with up to 20 watts per port. Furthermore, the EHWICs have a connection to the traditional router CPU and the new Multi-Gigabit Fabric (MGF) backplane. EHWICs are available in single-wide and double-wide form factors.
While researching solutions, you remember some of the new benefits the more recent L2TPv3 can provide. As you research some of the benefits of L2TPv3 you learn that a Layer 2 connection can be extended across a Layer 3 network using a feature called x-connect or a “pseudo-wire “. As you investigate further the requirements and configuration you realize you have everything needed to make this connectivity scenario happen. The hardware involved is a Cisco 2811 router at the remote distant building (across a L3 WAN) with the guest Internet router at the main site also being a 2811 both running a 12.4 T code that supports L2TPv3. An obvious requirement is IP connectivity between each 2811 router for the “pseudo-wire” to function. The remote router at the distant location is reachable already since it’s within your company’s routing (table) domain while the guest Internet router is L3 reachable via a management interface.



For more Cisco WS-X45-SUP6L-E information please click here

2013年10月31日星期四

C2901-VSEC Router Configuration

The Cisco C2901-VSEC Series offer unparalleled total cost of ownership savings and network agility through the intelligent integration of market leading security, unified communications, wireless, and application services. The Integrated Services Routers Generation 2 platforms are future-enabled with multi-core CPUs, support for high capacity DSPs (Digital Signal Processors) for future enhanced video capabilities, high powered service modules with improved availability, Gigabit Ethernet switching with enhanced POE, and new energy monitoring and control capabilities while enhancing overall system performance.

Cisco 2901 platform with 256 MB flash/512 MB DRAM
Software Image: Cisco 2901-2921 IOS UNIVERSAL
DSPs: PVDM3-16
Licenses: One FL-CUBEE-25 (25 sessions)

All Cisco 2900 Series Integrated Services Routers offer embedded hardware encryption acceleration, voice- and video-capable digital signal processor (DSP) slots, optional firewall, intrusion prevention, call processing, voicemail, and application services. In addition, the platforms support the industries widest range of wired and wireless connectivity options such as T1/E1, T3/E3, xDSL, copper and fiber GE.

2 RU and 1 RU units with up to 3 GE ports and up to 1 SFP port

UCS-E service module that can support Cisco and third-party apps, VMware ESXi, and MS hypervisor

Up to 2 service modules, 1 integrated service module (ISM) to host application services

Up to 50 LAN switch ports, 4 Enhanced High-Speed WAN Interface Card (EHWIC) slots

Security

Embedded hardware-accelerated VPN encryption, and Cisco Cloud Web Security

Integrated threat control using Cisco IOS Firewall and Cisco IOS IPS

Unified Communications

2 or 3 on-board digital signal processor (DSP) slots optimized for voice and video

Cisco Unified Border Element capabilities for up to 2100 sessions

Support for Cisco Unified Communications Manager Express, Cisco Unified Survivable Remote Site Telephony, and Cisco Unified Enhanced Survivable Remote Site Telephony (E-SRST)



For more WS-C3750X-24P-S information please click here

2013年10月30日星期三

HWIC-1FE EOL

The Cisco Gigabit Ethernet dual-identity Enhanced High-speed WAN Interface Card (EHWIC) brings both Small Form-factor Pluggable (SFP) and copper (RJ-45) Gigabit Ethernet connectivity to Cisco Integrated Services Routers (ISRs) to accelerate applications such as Ethernet WAN access, inter-VLAN routing (IVR), and high speed connectivity to LAN switches.
The single-port Cisco Gigabit Ethernet EHWIC provides Gigabit Ethernet optical and copper connectivity in a compact form factor to the Cisco Integrated Service Router Generation 2 (ISR G2).

Cisco HWIC-1FE,1-port 10/100 Routed Port HWIC,  is EOL (end of life) now, the replacement is Cisco EHWIC-1GE-SFP-CU, EHWIC 1 port dual mode SFP(100M/1G) or GE(10M/100M/1G). EHWIC-1GE-SFP-CU list price: 700 USD, 3Anetwork.com sells at: 46% off, 435 USD, reference: http://www.3anetwork.com/cisco-ehwic-1ge-sfp-cu-price_p1188.html, EHWIC-1GE-SFP-CU

Product Highlights
Weighted Random Early Detection (WRED)
Precedence setting and mapping (IEEE 802.1p)
Access control lists (ACLs)
MAC address filtering
Extended ACLs
Voice and remaining QoS features, per platform and per Cisco IOS software release
Support for the same Ethernet features as supported on the ISR G2 on-board Ethernet ports
Flow control (IEEE 802.3x)
Gigabit EtherChannel for link redundancy
Simple Network Management Protocol (SNMP) support
Remote Monitoring (RMON) support
Cisco NetFlow accounting
IP service-level agreement (IP-SLA)
Jumbo frame support
Cisco Group Management Protocol (GMP) and Internet Group Management Protocol (IGMP) for multicasting
High availability
Hot insertion and removal for SFPs on all platforms
Media or SFP type display through a command-line interface (CLI)

No connection to the ISR G2 router's Multi-Gigabit Fabric (MGF)

For more VWIC2-2MFT-T1/E1 information please click here

2013年10月29日星期二

How to configure a Loopback Interface on Cisco 2911 Router?

Cisco 2900 Series Integrated Services Routers (ISR) have modular design that allows for reuse of a broad array of existing modules that meet business requirements while maximizing investment protection. Among all C2911-VSEC, C2901-VSEC, Cisco2921-V and Cisco2911-V are best selling models.
      
interface type number
Router(config)# interface Loopback 0
Router(config-if)#
Enters configuration mode for the loopback interface.
ip address ip-address mask
Router(config-if)# ip address 10.108.1.1 255.255.255.0
Router(config-if)#
Sets the IP address and subnet mask for the loopback interface.
exit
Router(config-if)# exit
Router(config)#
Exits configuration mode for the loopback interface and returns to global configuration mode.


For more Cisco2911-V information please click here

2013年10月28日星期一

How to configure Power Stack Switch Power Parameters on Catalyst 3560-X Switch?

Cisco delivers a comprehensive portfolio of switching solutions for Borderless Networks, data centers, and smaller businesses. These solutions are optimized for a wide range of industries, including service providers, financial services, and the public sector. The WS-C3560V2-24TS-S Series Switches is an enterprise-class lines of stackable and standalone switches.

      
      
Command
Purpose
Step 1

configure terminal

Enter global configuration mode.

Step 2

stack-power switch switch-number

Enter the stack member number of the switch in the power stack and enter switch stack power configuration mode. The range is from 1 to 9.

Note       Only four switches can belong to the same power stack.

Step 3

stack [power-stack-name]

Enter the name of the power stack to which the switch belongs. The name can be up to 31 characters. If you do not enter a name and no other switches in the power stack have a name configured, a power-stack name is automatically generated.

Step 4

power-priority switch value

Set the power priority of the switch. The range is from 1 to 27. This value must be lower than the value set for the low and high-priority ports.

Step 5

power-priority high value

Set the power priority of the PoE ports on the switch that are configured as high-priority ports. The range is from 1 to 27, with 1 as the highest priority. The high value must be lower than the value set for the low-priority ports and higher than the value set for the switch.

Step 6

power-priority low value

Set the power priority of the PoE ports on the switch that are configured as low-priority ports. The range is from 1 to 27. This value must be higher than the value set for the low-priority ports and the value set for the switch.

Step 7

end

Return to privileged EXEC mode.

Step 8

show stack-power

Verify your entries.

Step 9

copy running-config startup-config

(Optional) Save your entries in the configuration file.



For more Cisco WS-C3560V2-48TS-S  information please click here

How to configure Cisco Advanced QoS on Cisco WS-C3560X-24P-L switch?

How to configure Cisco Advanced QoS on Cisco WS-C3560X-24P-L switch?

Catalyst 3560X 24 Port PoE LAN Base

This Cisco WS-C3560V2-48PS-S Catalyst switch offers superior multilayer, granular QoS features to help ensure that network traffic is classified and prioritised, and that congestion is avoided in the best possible manner. Configuration of QoS is greatly simplified through automatic QoS (Auto QoS), a feature that detects Cisco IP phones and automatically configures the switch for the appropriate classification and egress queuing. This optimises traffic prioritisation and network availability without the challenge of a complex configuration.

The Cisco WS-C3560V2-48PS-S Catalyst switch can classify, reclassify, police, mark, queue, and schedule incoming packets, and can queue and schedule packets at egress. Packet classification allows the network elements to discriminate between various traffic flows and enforce policies based on Layer 2 and Layer 3 QoS fields.

The Cisco WS-C3560V2-48PS-S Catalyst switch supports four egress queues per port, allowing the network administrator to be more discriminating and specific in assigning priorities for the various applications on the LAN. At egress, the switch performs scheduling and congestion control. Scheduling is an algorithm or process that determines the order in which the queues are processed. The Cisco Catalyst 3560 Series Switch supports shaped round robin (SRR) and strict priority queuing. The SRR algorithm helps ensure differential prioritisation.

The Cisco Catalyst 3560-X Series Switches are an enterprise-class lines of stackable and standalone switches, respectively. These switches provide high availability, scalability, security, energy efficiency, and ease of operation with innovative features such as IEEE 802.3at Power over Ethernet Plus (PoE+) configurations, optional network modules, redundant power supplies, and Media Access Control Security (MACsec) features. The Cisco Catalyst 3560-X enhances productivity by enabling applications such as IP telephony, wireless, and video for borderless network experience.

For more Cisco information please visit:
http://www.3anetwork.com/cisco-ws-c3560x-24p-s-price_p51.html

2013年8月30日星期五

WIC killed our 1841s?

Question:

Short version:Cisco 3925E  Has anyone ever seen the installation of a WIC card in an 1841 render the router inoperable?  (No SYS PWR led or fan?)

Long version:

    Our company recently decided to upgrade our existing T1 connections to remote offices by upgrading to dual T1 links using PPP multilink.

I had tested a setup in my office with a pair of 1841s, and got it working with a pair of VWIC2-2MFT-T1/E1 cards.  Sweet!

The routers currently have a single 1DSU-T1 V2 WIC card.  Our plan is to install the new VWIC2 cards alongside the existing T1 serial card so I can configure everything from the home office, then cut over everything in one day by simply moving cables over to the new VWIC2 card.

  We sent out the new VWIC2 card to our most remote office and sent instructions for how to remove the blank faceplate and install the second WIC module.   The next day our man onsite powers down the router, installs the card, and powers up the router, but no connection is made.  I drive out there and see that the router is completely dead.  No 'SYS PWR' led, or fan.   Even after removing the offending WIC and all WIC cards.  Hmmm.  Let's just set this aside for now.

   I brought a back up 1841 configured for the site, so I plug it in and get the network back up.  I'm able to ping the central office, and get a nagios confirmation that our site is back up.  Yay!

    Now the whole point of this exercise was to install the VWIC2 card for the upgrade, so I power down the router, install the VWIC2 card, and flip the power switch back on.  NOTHING!  No 'SYS PWR' led or fan.  Just like the first router that died.  I didn't think to bring a second known good router with me, so I get to do the whole drive again.  The next day I bring one of the routers I tested in my office with the VWIC2 already installed, and it works perfectly.

     The day after I swapped out the power supply in the broken routers with a known good power supply and both routers were still completely dead.  I imagine it must be something on the motherboard that is fried.

Has anyone ever seen anything like this before?

Answer:

I wouldn't put it into another router  See if you can get a different one. This isn't a normal occurence... Cisco3925E

For more info, http://site4807539.edit.build.angelfire.lycos.com/index/

2013年8月29日星期四

EIGRP issue using VRF on 3750

Question:

I am in the WS-C3750X-24P-S  Lab playing with VRF, got it to work when the switchport itself is a no switchport with IP address, however if I stick the Wan connecting interface into a vlan EIGRP wont create a Neighborship though I can ping it under that VRF.

interface FastEthernet1/0/1
description WAN interconnection
switchport access vlan 5


router eigrp 90
address-family ipv4 vrf NHSS
  network 10.202.128.0 0.0.31.255
  passive-interface default
  no passive-interface FastEthernet1/0/1
  autonomous-system 90
exit-address-family

interface Vlan5
ip vrf forwarding NHSS
ip address 10.202.128.200 255.255.255.0

switch-x#ping vrf NHSS 10.202.128.12

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.202.128.12, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/8 ms
switch-x#


switch-x#sh ip eigrp vrf NHSS ne
EIGRP-IPv4 Neighbors for AS(90) VRF(NHSS)
switch-x#

So does anyone know why I cant neighbour 10.202.128.12 now that f1/0/1 is a switchport and in a vlan?


Config:-

!
!
interface GigabitEthernet0/25
description LARGE_GLOBAL_CARRIER_CIRCUIT_NAME_HERE
no switchport
ip address 172.21.67.18 255.255.255.252 secondary
ip address PUBLIC_IP 255.255.255.252
load-interval 30
end
!
!
router ospf 1
router-id 172.21.67.1
log-adjacency-changes
passive-interface default
no passive-interface Vlan200
network xxx.xxx.xxx.xxx 0.0.0.255 area 0
network xxx.xxx.xxx.xxx 0.0.0.255 area 0
network xxx.xxx.xxx.xxx 0.0.0.255 area 0
network 172.21.67.16 0.0.0.3 area 0
!


Any ideas?

Many thanks in advance,

Answer:

This starts to look like an IOS bug. Can you perhaps try to totally remove the entire EIGRP configuration and configure it completely anew? Avoid configuring the passive interfaces at this point. In addition, can you assign the "global" EIGRP process a different AS number than the ASN 90 for the NHSS VRF EIGRP?

I assume that interface Vlan5 reports as "up, line protocol up" - a silly question considering the fact that you can ping the other party but nevertheless - let's check it. WS-C3750V2-24PS-S 
For more info, http://lilirouter.angelfire.com/

2013年8月28日星期三

Inconsistent Address & Mask P2P T1

Question:

I have a P2P T1 between WS-C3560V2-24PS-S  locations, each router have two ethernet interfaces, one interface is configured for communitcations between locations for our phone system.  What I am trying to achive here is to use the second interface on each router for data traffic.  I have for the phones interface configured with IP's 10.x.x.x with static routes set which works without issue, now when I configure the second interface with IP's 172.x.x.x and attempt to create a static route from one side to the other i receive the following error "inconsistent address & mask" I have even attempted to change the subnet mask to another value without success.

Answer:

This looks like a typo in your ip route command. What exact network address and netmask are WS-C3560V2-48PS-S Price you using?


2013年8月15日星期四

c3560 switch is not allowing telnet or SSH

Question:

I have got my WS-C3750X-24S-S   ccna voice lab configured and is up and running, my switch is configured with 2 differents Vlans (Data & Voice) and the fa 0/1 is configured as trunk port connecting to the CME router.  I can telnet or ssh to all the devices on the network but only the switch in not accepting the request the only message I am getting is "request timeout".
Please could someone help me with the correct set up procedure.

Answer:

Are you connecting your computer directly to this switch and trying to telnet? The problem I believe is that all of your switchports (at least from what I see) are configured for vlan 10. There isn't a vlan 10 interface to route between vlan 10 and vlan 1.

Try this:

On one port that you'll connect your PC to, make that an access port to vlan 1. Then change your address on your pc to 192.168.1.10 255.255.255.0 Gateway 192.168.1.7.

Then see if you can ping and telnet into the switch. If so, and you're wanting your pc to be on vlan 10, you'll need to create a L3 svi for it:

int vlan 10
ip address x.x.x.x 255.255.255.0

Then you should be able to route between everything. WS-C3750X-48P-L Price

For more info, please refer to http://www.pereza.info/es/blog/named-extended-access-list-7200

2013年8月14日星期三

Cisco 2911 + HWIC-3G-HSPA

Question:

I'm trying to C2911-VSEC configure this module first time in my life, and ran into an issue.

When I do, 'show cellular x/x/x security' it keeps reporting my SIM status as removed. I've reseated it few times now, and now i'm starting to think that micro SIM may not be supported by this module.

Does anyone know about this? It's hard to find it on google, spent last few hour researching it. I could only find this from Cisco document:
SIM card socket; compliant with ISO-7816-2 (SIM mechanical)

And some sample configuration would be much appreciated.

Thanks in advance,

Answer:


Are you using a proper micro-sim adapter ? For futher information, please refer to  http://www.3anetwork.com/cisco-c2901-vsec/k9-price_p249.html

BGP Load Balancing Scenario

Question:

I am looking WS-C3560X-48PF-L  for some guidance with the following. I have a feeling I am missing something or that there is a better way

I have the following setup, eBGP to the same ISP, iBGP inside the AS between the routers and 6509s

I would like to do the following, lets say I have 1.1.1.0.... 1.1.6.0

These are advertised by my 6509s through BGP. I would like to balance the traffic across both of the links, so inbound/outbound traffic would be

1.1.1.0 to 3925 (primary) and 3825 as secondary
1.1.2.0 to 3825 (primary) and 3925 as secondary

I was thinking I should be able to do this using route maps

on the 3925

access-list 1 permit 1.1.1.0
access-list 1 permit 1.1.3.0
access-list 1 permit 1.1.5.0
access-list 2 permit 1.1.2.0
access-list 2 permit 1.1.4.0
access-list 2 permit 1.1.6.0

route-map subnet permit 10
match ip address 1
set as-path prepend 65401 65401

route-map subnet permit 20
match ip address 2

router bgp x.x.x.x
neighbor <core1> route-map subnet in
neighbor <core2> route-map subnet in

3825
access-list 1 permit 1.1.1.0
access-list 1 permit 1.1.3.0
access-list 1 permit 1.1.5.0
access-list 2 permit 1.1.2.0
access-list 2 permit 1.1.4.0
access-list 2 permit 1.1.6.0

route-map subnet permit 10
match ip address 2
set as-path prepend 65401 65401

route-map subnet permit 20
match ip address 1

router bgp x.x.x.x
neighbor <core1> route-map subnet in
neighbor <core2> route-map subnet in

Any help would be much appreciated

Answer:

if you are doing eBGP to the same AS ISP you can use MED outbound to influence how traffic is routed to your network and so setting a lower or higher metric is enough.

In any case the route-map should be applied outbound to the eBGP neighbor and not inbound to the iBGP sessions.
This is the usual practice.

route-map toISP-NA permit 10
match ip address 1
set metric 1000
route-map toISP-NA permit 20
match ip address 2
set metric 500

router bgp x.x.x.x
neigh <e-bgp-neigh> route-map toISP-NA out

on second border router

route-map toISP-NB permit 10
match ip address 1
set metric 500
route-map toISP-NB permit 20
match ip address 2
set metric 1000

router bgp x.x.x.x

neigh <e-bgp-neigh> route-map toISP-NB out

2013年8月11日星期日

BGP maximum paths

Question:

I am hoping one WS-C3560V2-24TS-S  of you can help me with a problem I am having relating to BGP and load balancing.  I have a network configured as
per the diagram with maximum-paths ibgp 2 configured on each of my core switches all routes are learned via R3 and R4 and have
no manipulation from our routers.  All routers and switches are connected and established via IBGP.

The problem is that I should have two routes to each destination in the core switches yet I only have a single route, and from
what I can see this is because our telco is injecting a metric into our AS, however, I only see this metric on the core switches
not on the routers and I would have thought I would see it on the router?

Show IP BGP and show IP routes


R3>sh ip bgp 29.12.0.0
BGP routing table entry for 29.12.0.0/21, version 859691
Paths: (4 available, best #3, table Default-IP-Routing-Table)
  Advertised to peer-groups:
     peer1
  2856 2856 2856 34140, (aggregated by 34140 29.12.7.68)
    10.9.35.29 from 10.9.35.29 (62.6.192.137)
      Origin IGP, localpref 100, valid, external, atomic-aggregate
      Community: 34140:222
  2856 34140, (aggregated by 34140 29.12.7.68), (received-only)
    10.9.35.29 from 10.9.35.29 (62.6.192.137)
      Origin IGP, localpref 100, valid, external, atomic-aggregate
      Community: 34140:222
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    10.9.35.17 from 10.9.35.17 (62.6.192.137)
      Origin IGP, localpref 100, valid, external, atomic-aggregate, best
      Community: 34140:111
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    161.163.164.249 (metric 156416) from 161.163.164.249 (161.163.164.249)
      Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate
      Community: 34140:111

Core-1>sh ip bgp 29.12.0.0
BGP routing table entry for 29.12.0.0/21, version 396742
Paths: (2 available, best #1, table Default-IP-Routing-Table)
Multipath: iBGP
  Advertised to update-groups:
     1
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    161.163.164.247 (metric 153856) from 161.163.164.247 (161.163.164.247)
      Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate, best
      Community: 2237399151
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    161.163.164.249 (metric 154112) from 161.163.164.249 (161.163.164.249)
      Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate
      Community: 2237399151

Core-1>sh ip ro 29.12.0.0
Routing entry for 29.12.0.0/21
  Known via "bgp 65356", distance 200, metric 0
  Tag 2856, type internal
  Last update from 161.163.164.247 7w0d ago
  Routing Descriptor Blocks:
  * 161.163.164.247, from 161.163.164.247, 7w0d ago
      Route metric is 0, traffic share count is 1
      AS Hops 2
      Route tag 2856


======================
Core 2
R4#sh ip bgp 29.12.0.0
BGP routing table entry for 29.12.0.0/21, version 422102
Paths: (4 available, best #4, table Default-IP-Routing-Table)
  Advertised to peer-groups:
     peer1
  2856 2856 2856 34140, (aggregated by 34140 29.12.7.68)
    10.9.35.25 from 10.9.35.25 (62.6.192.138)
      Origin IGP, localpref 100, valid, external, atomic-aggregate
      Community: 34140:222
  2856 34140, (aggregated by 34140 29.12.7.68), (received-only)
    10.9.35.25 from 10.9.35.25 (62.6.192.138)
      Origin IGP, localpref 100, valid, external, atomic-aggregate
      Community: 34140:222
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    161.163.164.247 (metric 156416) from 161.163.164.247 (161.163.164.247)
      Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate
      Community: 34140:111
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    10.9.35.21 from 10.9.35.21 (62.6.192.138)
      Origin IGP, localpref 100, valid, external, atomic-aggregate, best
      Community: 34140:111


Core-2>sh ip bgp 29.12.0.0
BGP routing table entry for 29.12.0.0/21, version 180821
Paths: (2 available, best #2, table Default-IP-Routing-Table)
Multipath: iBGP
  Advertised to update-groups:
     2
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    161.163.164.247 (metric 154112) from 161.163.164.247 (161.163.164.247)
      Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate
      Community: 2237399151
  2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
    161.163.164.249 (metric 153856) from 161.163.164.249 (161.163.164.249)
      Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate, best
      Community: 2237399151

Core-2>sh ip ro 29.12.0.0
Routing entry for 29.12.0.0/21
  Known via "bgp 65356", distance 200, metric 0
  Tag 2856, type internal
  Last update from 161.163.164.249 7w0d ago
  Routing Descriptor Blocks:
  * 161.163.164.249, from 161.163.164.249, 7w0d ago
      Route metric is 0, traffic share count is 1
      AS Hops 2
      Route tag 2856

Answer:

2856 34140, (aggregated by 34140 29.12.7.67), (received & used)
161.163.164.249 (metric 153856) from 161.163.164.249 (161.163.164.249)
Origin IGP, metric 0, localpref 100, valid, internal, atomic-aggregate, best


I believe MED=0 here, metric 153856 is WS-C3560V2-48TS-S Price the IGP metric to the BGP next-hop router?

2013年8月8日星期四

COMPARISON BETWEEN CISCO CATALYST 3560 V2 SERIES SWITCHES MODELS

The Cisco Catalyst 3560 v2 WS-C3750X-48PF-L Series are next-generation, energy-efficient, Layer 3 Fast Ethernet switches. These new switches support Cisco EnergyWise technology, which helps companies manage power consumption of the network infrastructure and network-attached devices, thereby reducing their energy costs and their carbon footprint.

Let’s take a look at the comparison table between cisco catalyst 3560 v2 series switches models.



For more information, WS-C3750X-48PF-S Price please refer to www.cisco.com.

2013年8月7日星期三

Routing Over a VPN Tunnel

Question:

I'm running into a WS-C3560V2-24TS-S problem with a route over a VPN tunnel.  We have 5 sites connected on a MPLS network.  We have a 6th site that is connected by a site-to-site VPN tunnel that terminates on one of the routers on the MPLS network.
This setup was working just fine for us.  Any of the 5 sites were able to connect to the 6th site by routing traffic first over the MPLS network and then over the VPN tunnel.
Now we ran into a problem when moving to a new WAN circuit on the rotuer that hosts the VPN.  We're moving our WAN circuit from a Serial interface to a Gigabit interface.  All the configuration has been done: the new circuit is up, the old circuit is down, and the VPN tunnel to the 6th site is up and terminated on the Gigabit interface.
But, now we have a problem routing traffic over this VPN tunnel.  Let's say the subnet at the 6th site is 1.1.1.0/24.  With the old circuit we had a route of 'ip route 1.1.1.0 255.255.255.0 Serial0/0/0:0.100' and this was working for us.  I updated this to use the Gigabit interface instead of the Serial, but it's not working.  I can ping over the VPN tunnel from the router, but no where else.
If I remove the route command alltogether I can ping from the local LAN of the router, but not from any of the remote sites (the 1.1.1.0/24 is no longer advertised by BGP and the traffic from the remote sites isn't routed properly anymore).
So, it seems like I'm just missing something simple here...or I hope I am anyway.  Everything should fine with the VPN configuration; that has remanied unchanged.  The crypto map was just moved from the Serial interface to the Gig interface.  The VPN certainly works just fine from the local router LAN when the route command is removed.  If anyone has any idea why the router doesn't send traffic over the VPN when the route command is in place I'd love to hear from you.


Answer:


Without the static route then the network is not in the routing table and if the network is not in the routing table then BGP can not advertise it. And if BGP does not advertise it then the remote sites do not know how to reach it. So the problem does center on the static route. The essence of the problem is in the way that you have expressed the static route. Using the interface to identify the exit point for the static route works fine when the exit is a point to point serial interface. But using the interface as the identifier is problematic when the interface is Ethernet. When you do a static route and specify an Ethernet as the exit then the router must ARP for every remote address. This can work if the next hop router has enabled proxy arp. But many providers do not. The best solution is to put the static route back into the config but to specify the next hop address as the exit rather than the interface.


For more WS-C3560V2-48TS-S Price news about Price ans Specification, you can click here.http://www.3anetwork.com/cisco-ws-c3560v2-48ts-s-price_p49.html